diff options
author | Hans Dedecker <dedeckeh@gmail.com> | 2018-08-24 15:02:24 +0200 |
---|---|---|
committer | Jo-Philipp Wich <jo@mein.io> | 2018-12-18 11:28:11 +0100 |
commit | 97fddb2fddbf81535f06f168752c9b7e4abaa87a (patch) | |
tree | 93600e0c2a52f54d36da2b80f802a3b7082763df /package/network/services/dnsmasq | |
parent | e005beec2d02ae0ab227b6de55d0670106255799 (diff) | |
download | upstream-97fddb2fddbf81535f06f168752c9b7e4abaa87a.tar.gz upstream-97fddb2fddbf81535f06f168752c9b7e4abaa87a.tar.bz2 upstream-97fddb2fddbf81535f06f168752c9b7e4abaa87a.zip |
dropbear: backport upstream fix for CVE-2018-15599
CVE description :
The recv_msg_userauth_request function in svr-auth.c in Dropbear through
2018.76 is prone to a user enumeration vulnerability because username
validity affects how fields in SSH_MSG_USERAUTH messages are handled,
a similar issue to CVE-2018-15473 in an unrelated codebase.
Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
(backported from 2211ee0037764e1c6b1576fe7a0975722cd4acdc)
Diffstat (limited to 'package/network/services/dnsmasq')
0 files changed, 0 insertions, 0 deletions